jadx-mcp-server
Verified Safeby zinja-coder
Overview
A fully automated Model Context Protocol (MCP) server that acts as a bridge for LLMs (like Claude) to interact with a JADX-AI-MCP plugin for Android APK reverse engineering, vulnerability analysis, and manifest parsing.
Installation
jadx_mcp_server --http --port 8651 --jadx-port 8650Security Notes
The server acts as a proxy, designed to communicate locally with a JADX-AI-MCP plugin via HTTP, mitigating external network exposure risks. It does not contain direct 'eval()' calls or hardcoded secrets. Powerful modification tools (rename functions for classes, methods, fields, and packages) and debugger interactions are exposed. If misused by an unsupervised LLM, these tools could lead to unintended code modifications or exposure of sensitive debug information. However, this is inherent to its reverse engineering purpose and requires responsible user oversight. The project also notes an 'Audited and Received Assessment Badge' from Mseep.net.
Similar Servers
ida-pro-mcp
An AI-powered reverse engineering assistant that integrates IDA Pro with Model Context Protocol clients for enhanced analysis.
jadx-ai-mcp
Integrates JADX decompiler with LLMs via Model Context Protocol for AI-powered Android APK analysis and reverse engineering.
easy-code-reader
Provides a Model Context Protocol (MCP) server for AI assistants to intelligently read Java source code from local projects and Maven dependencies, supporting decompilation and multi-module analysis.
Reversecore_MCP
The Reversecore_MCP server provides a Micro-Capability Platform (MCP) enabling AI agents to perform comprehensive binary analysis, malware detection, vulnerability research, and security report generation using integrated tools like Radare2, Ghidra, LIEF, and YARA.